Sciweavers

1767 search results - page 336 / 354
» Accessibility first!: a new approach to web design
Sort
View
ASPLOS
2006
ACM
13 years 10 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
MICRO
2002
IEEE
117views Hardware» more  MICRO 2002»
13 years 8 months ago
Generating physical addresses directly for saving instruction TLB energy
Power consumption and power density for the Translation Lookaside Buffer (TLB) are important considerations not only in its design, but can have a consequence on cache design as w...
Ismail Kadayif, Anand Sivasubramaniam, Mahmut T. K...
ICS
2010
Tsinghua U.
14 years 6 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
PPOPP
2011
ACM
12 years 11 months ago
GRace: a low-overhead mechanism for detecting data races in GPU programs
In recent years, GPUs have emerged as an extremely cost-effective means for achieving high performance. Many application developers, including those with no prior parallel program...
Mai Zheng, Vignesh T. Ravi, Feng Qin, Gagan Agrawa...
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 4 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad